American Liberties is at hand

A: A key logger is a piece of malicious software (or “malware”) which records every keystroke you make on a keyboard. Keyloggers can be installed without your knowledge or consent when you visit a website or email, install a program, or perform other activities. Once installed, the keylogger records your key strokes, and then “phones home” to upload your confidential information to a complete stranger.

Q: How do keyloggers & spyware get on my computer?

A: Keyloggers are often hidden inside what appears to be legitimate applications, graphics, music files, downloaded pictures, etc. Identity thieves and hackers get you to unwittingly download their malicious software through an email or instant message that “makes sense”. The world–renowned Australian Computer Emergency Response Team (ausCert), has published a report showing that 80% of all keyloggers are not detectable by Anti–Virus software, Anti–Spyware software or Firewalls. Identity thieves have also been known to portray themselves as kids on popular teen sites and share infected files. Listed below are just “some” of the creative ways in which Identity thieves have been known to distribute their keyloggers:

A: Yes. ClickJacking is a malware technique using iframes and web page layers in HTML to get a user to click on a potentially dangerous button or link. You overlay the potentially malicious button on top of an existing legitimate web page button such that when a user clicks what they believe is the legitimate button they are instead clicking your malicious button. This all happens transparently to the user. At this point the users click on the button has been “ClickJacked”. “Opacity” clickjack is when you make the malicious page invisible and put it on top of the friendly page. “Positional” clickjack is when the malicious button or link is camouflaged by carefully surrounding it with a friendly page.

CFA Defender “Guarded ID”® includes warnings for “Opacity” clickjacking as well as “Positional” clickjacking.

Q: How big is the cybercrime problem?

A: Someone’s Identity is stolen “Every Three Seconds”. The FBI recently released a report stating for the first time ever, that cybercrime revenues have exceeded drug trafficking as the most lucrative illegal global business, estimated at reaping more than $1 Trillion annually in illegal profits.

Q: Why would an ID Thief want to steal my keystrokes?

A: Stolen keystrokes lead to money! Keyloggers are designed to steal your keystrokes when you bank, shop and email online. We bank online. We pay bills online. We fill out applications online. We check our 401Ks online. We send contracts online, shop with our credit cards online, we log into our corporate networks and type sensitive and corporate information. The personal and financial information that you enter both off and online is exactly what the Identity thief is after.

Q: Can cyber predators watch what my kids are doing online?

A: The Center for Missing and Exploited Children reported 2,660 incidents of adults using the Internet to entice children into meeting in 2005. Attorney General Alberto Gonzales said in April that one in every five children who go online is solicited, and that at any given time 50,000 predators are online trolling for youth contact.

“Predictability. They say ‘I’m in school, I’m going bowling one night, I’m going to the movies one night.’ They give their name, they give out their birth date and their likes or dislikes,” Sue Balz-Verzal, a Wisconsin mother of two, said. “Kids are giving out way too much information online.”

Cyber–security consultant Tom Kellermann says 500 agents work primarily on cyber crime. The FTC states that 10 million Americans’ identities have been stolen. According to KXTV, children aren’t immune from identity theft. Senator Hillary Rodham Clinton says as many as 400,000 children may be victims of identity theft. The number of complaints involving kids has grown by 78 percent, making it the fastest growing segment of ID Theft victims. Mrs. Clinton cites a case in which an identity thief used a 7-year–old’s name, Social Security number and clean credit history to buy a $40,000 houseboat.

Q: Why is encryption the strongest form of security?

A: Encryption is a process that scrambles information into a format that unauthorized parties cannot decode or utilize. 128-bit encryption is the strongest, most secure form of encryption generally utilized in Internet browsers in North America. According to RSA Labs, it would take trillion-trillion years to crack this type of encryption using today’s technology.

CFA Defender “Guarded ID”® utilizes 128-bit encryption to keep your information secure both on and offline and then re-routes that encrypted information on a separate path directly to your browser, bypassing any malicious programs that may be hiding in your computer to steal your personal information.

Q: Who is using CFA Defender “Guarded ID”®?

A: Currently, CFA Defender “Guarded ID”® is being used by both consumers and businesses throughout the United States and Canada, as well as up to 45 countries around the world.

Share this:

Like this:

Read here what one American, David Myrland, did when he realized the scam:

“In 1988 (April 15th) the IRS found me and accused me of having failed to report any tips on my 1984 tax return. At that time I was one of the fastest bartenders alive and took exception to the attitude and tone of the IRS’ Agent, and began studying tax law in June of 1988. In 1994 I made a couple of appearances as an expert witness in tax trials and completed my treatise which detailed a host of differences between the Tax Code and the IRS’ standard operating procedure which was discovered through my six years of analysis. This 1994 treatise has prevented approx. ten tax indictments since 2004.

The depth of my research led me to conclusions about parts of the Tax Code that nobody else has sought to use in their curriculum’s, organizations, or law practice. Tax Code § 83 is perhaps the best example of this dynamic of my curriculum. It still astonishes me when I think of being the only one I know of that bothers with this statute, yet the courts say that it applies to any and all compensation for services, that it “explains how property received in exchange for services is taxed.” Twenty years after I wrote the first edition of this manual in 1994 I am still the only one interested in its language to any degree.

By the Supreme Court’s October Term of 1998 my clients had petitioned five times, two of whom made it past the clerks to the Justices before being denied. I am 5 for 6 against the Oregon State Attorney General in civil cases. In 2005, in US District Court – Austin, TX, Ass’t US Attorney Stephen Bass asked for and received a “protective order” to keep from having to indulge my primary arguments against income taxation as the IRS advises. That protective order was Exhibit #1 behind my Jan. 2006 complaint to eighty members of Congress, to which I’ve never received so much as an acknowledgement or reply of any nature. In 2007 a criminal defense attorney I had tutored asked a twenty year IRS Officer, “How did § 83 operate in your determination that Mr. Gebauer owed an income tax on his compensation?” The IRS Officer, Sue Besson, replied, “I am unfamiliar with § 83.”

Gudmundsson v. US, 634 F.3d 212 (CA2 2011): “At the heart of this case is I.R.C. § 83, which governs the taxation of property transferred in connection with the performance of services.”

Robinson v. C.I.R., 82 USTC 444, 459 (1984); The legislative history of section 83 does not require the conclusion that the statute should be applied to tax-avoidance techniques only. To the contrary, the House and Senate reports specifically delineate transactions and transfers to which section 83 was not to apply and do not exclude from its purview contractual provisions that were not tax motivated.”

Cohn v. C.I.R., 73 USTC (Tax Court) 443, 446 (1979): “Petitioners rest their entire case on the proposition that Elovich and Cohn and/or Mega were “independent contractors” and not employees of the Integrated and that, therefore, section 83 does not apply to the acquisition of the shares from Integrated. They rely on the legislative history surrounding the statute to support their proposition that section 83 was intended to apply only to restricted stock transferred to employees. Respondent contends that the words “any person” in section 83(a) encompass independent contractors as well as employees. We agree with Respondent. . . . We reject petitioner’s argument. While restricted stock plans involving employers and employees may have been the primary impetus behind the enactment of section 83, the language of the section covers the transfer of any property transferred in connection with the performance of services “to any person other than the person for whom the services are performed.” (Emphasis added.) The legislative history makes clear that Congress was aware that the statute’s coverage extended beyond restricted stock plans for employees. H.Rept. 91-413 (Part 1) (1969), 1969-3 C.B. 200, 255; S.Rept. 91-552 (1969), 1969-3 C.B. 423, 501. The regulations state that that section 83 applies to employees and independent contractors (sec. 1.83-1(a), Income Tax Regs.). There is no question but that, under the foregoing circumstances, these regulations are not “unreasonably and plainly inconsistent with the revenue statutes.” Consequently, they are sustained. (cites omitted)”

MacNaughton v. C.I.R., 888 F.2d 418, 421 (CA6 1989): “The Alves court stated that the plain language of section 83 belied this argument because the “statute applied to all property transferred in connection with the performance of services” and because no reference is made to the term “compensation.” Id. The court further concluded in Alves that “if Congress had intended section 83(a) to apply solely to restricted stock used to compensate employees, it could have used much narrower language.” Id. at 481-82. Upon consideration, we agree with the interpretation advanced by the Alves court and, therefore, join the Ninth Circuit in holding that section 83 is not limited to stock transfers which are compensatory in nature.”

Pledger v. C.I.R., 641 F.2d 287, 293 (CA5 1981): “The taxing scheme imposed by Congress more accurately reflects what taxpayer received as compensation than a scheme that taxes the taxpayer on merely a portion of the compensation.”

Alves v. C.I.R., 734 F.2d 478, 481 (CA9 1984): “The plain language of section 83(a) belies Alve’s argument. Section 83(a) applies to all property transferred in connection with the performance of services. No reference is made to the term “compensation.” Nor is there any statutory requirement that property have a fair market value in excess of the amount paid at the time of transfer. Indeed, if Congress had intended section 83(a) to apply solely to restricted stock used to compensate its employees, it could have used much narrower language. Indeed, Congress made section 83(a) applicable to all restricted “property,” not just stock; to property transferred to “any person,” not just to employees; and to property transferred “in connection with . . . services,” not just compensation for employment. See Cohn v. Commissioner, 73 USTC 443, 446-47 (1979).” [1]

An IRS Officer of twenty years is “unfamiliar with § 83” which determines whether or not somebody who received compensation even owes a tax to begin with? Really? She was lying. These circuit courts (US Courts of Appeals) and US Tax Court say it’s the controlling statute, I’ve began hammering on the IRS with it in 1993 five times to the Supreme Court, and an Officer of twenty years is “unfamiliar” with it? Nobody has an option but to consider the statute and to comply with it, and my manual explains my conclusion about statutory language that has the IRS lying about its considerations.

Share this:

Like this:

Imagine a stranger standing over your shoulder watching you log in to your online bank account. This scenario plays out in the virtual world as cyber criminals virtually monitor keystrokes as you type on your computer keyboard. The monitoring occurs via applications called keyloggers. Clever criminals devise multiple methods to steal your information, though keylogging applications operate using similar principles.

Keylogging Definition: A device or software that records keystrokes entered by a user, usually to secretly monitor and/or maliciously use this information.

A keylogger is a tool that captures and records a user’s keystrokes. It can record instant messages, email, passwords and any other information you type at any time using your keyboard. Keyloggers can be hardware or software.

A software keylogger can be downloaded and installed as a program running in the background. Software keyloggers may also be embedded in spyware, allowing your information to be transmitted to an unknown third party over the Internet.

Share this:

Like this:

Do you believe progressives are corrupting and weakening traditional American values and principles?

Do you think that big government is the greatest threat to the people’s individual liberty?

Are you ready to stand and be counted and make your voice heard?

Are you tired of seeing your values under assault in our homes, our schools, in our churches and in our courts?

Have you ever wished you could do something about it? That you can make a difference?

Would you agree that the liberals control the mainstream media today?

Who is in control what is said, and what is left out, was stories are told and house news is reported is designed to determine, shape and guide public opinion according to the progressive, liberal agenda?

Now there is a new voice for truth in the media!

America is at a crossroads. Financial management in Washington and Obama care threatens not only our economic growth, but our very existence as a free people as Ronald Reagan has said, and I quote, “we’re never more than one generation away from losing our freedom”

Now, like the Calvary coming over the hill, comes an organization that represents a new voice for liberty.

The people cannot and should not allow this unchecked here and need to continue!

We must turn up the pressure to get America back on track.

We must revive our economy and say the American dream by reigning in government spending, cutting red tape, and keeping taxes low and fair…

We must renew the American dream and reclaim our future by getting back to the first principles and the Constitution, protecting our country and reducing government dependence.

WAKE UP AMERICA has a plan to get America back on track, but tens of thousands of Americans back to work, ensure the protection of our rights and our existence as free people…

We must not despair; we must not give up, we must fight back! Together we can force big government tyranny into full retreat!

By running massive print, radio, TV, and Internet ad campaigns, we will create awareness on the urgent issues facing our country today, educate and activate people to action and hold politicians accountable!

Share this:

Like this:

Be On The Offense!

Gain Knowledge to Assert Rights that are Protected by The Constitution! What Does It Mean to You to be an 'American'?

Aside from the American Liberties work that I do (RE: encouraging others to gain knowledge to assert rights that are protected by the Constitution), I'm also looking for people who are serious about restoring America’s Exceptionalism, we need your help to WAKE UP AMERICA!